Skip to main content

CVE-2022-3024: CWE-863 Incorrect Authorization in Unknown Bitcoin Satoshi Tools : Faucets, Visitor Rewarder, Satoshi Games, Referral Program

Medium
VulnerabilityCVE-2022-3024cvecve-2022-3024cwe-863cwe-352
Published: Mon Sep 26 2022 (09/26/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Bitcoin Satoshi Tools : Faucets, Visitor Rewarder, Satoshi Games, Referral Program

Description

The Simple Bitcoin Faucets WordPress plugin through 1.7.0 does not have any authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscribers to call it and add/delete/edit Bonds. Furthermore, due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issues

AI-Powered Analysis

AILast updated: 07/08/2025, 10:27:08 UTC

Technical Analysis

CVE-2022-3024 is a medium-severity vulnerability affecting the WordPress plugin "Bitcoin Satoshi Tools: Faucets, Visitor Rewarder, Satoshi Games, Referral Program" up to version 1.7.0. The core issue is an incorrect authorization (CWE-863) combined with a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) in an AJAX action endpoint. This flaw allows any authenticated user, including low-privileged roles such as subscribers, to perform unauthorized actions like adding, deleting, or editing "Bonds" within the plugin. The absence of proper authorization checks means that users who should not have administrative capabilities can manipulate plugin data. Additionally, the plugin lacks proper sanitization and escaping of user input, which can lead to Stored Cross-Site Scripting (XSS) vulnerabilities. Stored XSS can allow attackers to inject malicious scripts that execute in the context of other users' browsers, potentially leading to session hijacking, privilege escalation, or distribution of malware. The CVSS v3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), and user interaction (UI:R), with a scope change (S:C) and limited confidentiality and integrity impact (C:L/I:L), but no availability impact (A:N). No known exploits are reported in the wild as of the publication date (September 2022). The vulnerability is particularly concerning because WordPress plugins are widely used and often targeted, and the plugin in question relates to cryptocurrency-related tools, which are attractive targets for attackers due to the financial incentives involved. The lack of patch links suggests that no official fix was available at the time of reporting, increasing the risk for users who have not implemented their own mitigations.

Potential Impact

For European organizations, especially those operating cryptocurrency-related websites or services using WordPress, this vulnerability poses a tangible risk. Unauthorized manipulation of plugin data could lead to fraudulent transactions, reward manipulations, or disruption of user trust in cryptocurrency faucets and reward programs. Stored XSS could compromise administrative accounts or users interacting with the plugin, potentially leading to broader site compromise or data leakage. Given the financial nature of the plugin, exploitation could result in direct monetary losses or reputational damage. Furthermore, the vulnerability could be leveraged as a foothold for further attacks within the organization's network, especially if the WordPress instance has elevated privileges or access to sensitive backend systems. The medium severity rating indicates that while the vulnerability is not critical, it is exploitable with relatively low privileges and can have meaningful impact on confidentiality and integrity. European organizations with WordPress sites running this plugin should be vigilant, as attackers often target financial and cryptocurrency-related platforms. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits over time.

Mitigation Recommendations

1. Immediate mitigation should involve restricting user roles that can authenticate to the WordPress site, especially limiting subscriber or low-privilege accounts from accessing the vulnerable AJAX actions. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests targeting the plugin's endpoints. 3. If possible, disable or remove the Bitcoin Satoshi Tools plugin until a patched version is released. 4. Monitor logs for unusual activity related to bond management or AJAX calls within the plugin. 5. Employ Content Security Policy (CSP) headers to mitigate the impact of potential Stored XSS attacks. 6. Regularly update WordPress core and plugins; once a patch is available for this vulnerability, apply it promptly. 7. Conduct security audits and penetration testing focusing on WordPress plugins, especially those handling financial transactions or rewards. 8. Educate users and administrators about the risks of phishing or social engineering that could exploit CSRF or XSS vectors. 9. Consider implementing multi-factor authentication (MFA) for administrative accounts to reduce the risk of account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-08-29T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f368b0acd01a24926112b

Added to database: 5/22/2025, 2:36:59 PM

Last enriched: 7/8/2025, 10:27:08 AM

Last updated: 8/11/2025, 2:48:10 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats